Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Boksburg

Region: Gauteng

Country: South Africa

Internet Service Provider: Vodacom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.29.20.95
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46388
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.29.20.95.			IN	A

;; AUTHORITY SECTION:
.			300	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024052900 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 29 15:15:37 CST 2024
;; MSG SIZE  rcvd: 104
Host info
95.20.29.41.in-addr.arpa domain name pointer vc-gp-s-41-29-20-95.umts.vodacom.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
95.20.29.41.in-addr.arpa	name = vc-gp-s-41-29-20-95.umts.vodacom.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
150.109.150.77 attack
Apr 15 11:15:18 raspberrypi sshd\[20438\]: Failed password for root from 150.109.150.77 port 34896 ssh2Apr 15 11:16:52 raspberrypi sshd\[21546\]: Invalid user guest from 150.109.150.77Apr 15 11:16:54 raspberrypi sshd\[21546\]: Failed password for invalid user guest from 150.109.150.77 port 56062 ssh2
...
2020-04-15 20:13:06
119.65.195.190 attack
Apr 15 14:06:52 vps sshd[707802]: Failed password for invalid user ubuntu from 119.65.195.190 port 51202 ssh2
Apr 15 14:10:03 vps sshd[726477]: Invalid user karaf from 119.65.195.190 port 41596
Apr 15 14:10:03 vps sshd[726477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.65.195.190
Apr 15 14:10:05 vps sshd[726477]: Failed password for invalid user karaf from 119.65.195.190 port 41596 ssh2
Apr 15 14:13:20 vps sshd[745270]: Invalid user testing from 119.65.195.190 port 60224
...
2020-04-15 20:31:49
78.130.183.200 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-04-15 20:21:51
218.102.85.248 attackbots
Honeypot attack, port: 5555, PTR: pcd553248.netvigator.com.
2020-04-15 20:22:23
139.199.229.228 attack
Apr 15 14:28:47  sshd[32759]: Failed password for invalid user admin from 139.199.229.228 port 56864 ssh2
2020-04-15 20:51:47
141.98.81.108 attack
Apr 15 14:13:16 vmd26974 sshd[8922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.108
Apr 15 14:13:18 vmd26974 sshd[8922]: Failed password for invalid user admin from 141.98.81.108 port 44231 ssh2
...
2020-04-15 20:36:10
203.130.255.2 attack
Apr 15 02:26:22 web1 sshd\[19731\]: Invalid user anna from 203.130.255.2
Apr 15 02:26:22 web1 sshd\[19731\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.130.255.2
Apr 15 02:26:23 web1 sshd\[19731\]: Failed password for invalid user anna from 203.130.255.2 port 50030 ssh2
Apr 15 02:30:49 web1 sshd\[20132\]: Invalid user hamish from 203.130.255.2
Apr 15 02:30:49 web1 sshd\[20132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.130.255.2
2020-04-15 20:39:22
173.252.183.120 attackspam
Apr 15 12:41:12  sshd[23094]: Connection closed by 173.252.183.120 [preauth]
2020-04-15 20:53:09
23.254.217.213 spam
This site is sending scam test message to phones, pretending to be government.
2020-04-15 20:29:14
93.198.11.75 attackspambots
Apr 15 12:22:49 marvibiene sshd[47714]: Invalid user oldbody from 93.198.11.75 port 43964
Apr 15 12:22:49 marvibiene sshd[47714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.198.11.75
Apr 15 12:22:49 marvibiene sshd[47714]: Invalid user oldbody from 93.198.11.75 port 43964
Apr 15 12:22:50 marvibiene sshd[47714]: Failed password for invalid user oldbody from 93.198.11.75 port 43964 ssh2
...
2020-04-15 20:28:29
171.220.243.192 attack
Apr 15 14:13:18 ns381471 sshd[32688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.220.243.192
Apr 15 14:13:20 ns381471 sshd[32688]: Failed password for invalid user stunnel4 from 171.220.243.192 port 44118 ssh2
2020-04-15 20:34:18
45.143.223.127 attackbots
Apr 15 12:13:22 nopemail postfix/smtpd[12630]: NOQUEUE: reject: RCPT from unknown[45.143.223.127]: 554 5.7.1 : Relay access denied; from= to= proto=ESMTP helo=
...
2020-04-15 20:30:20
49.233.204.37 attackbots
Apr 15 15:09:44 Enigma sshd[32649]: Failed password for invalid user igw from 49.233.204.37 port 42024 ssh2
Apr 15 15:13:29 Enigma sshd[720]: Invalid user postgres from 49.233.204.37 port 51258
Apr 15 15:13:29 Enigma sshd[720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.204.37
Apr 15 15:13:29 Enigma sshd[720]: Invalid user postgres from 49.233.204.37 port 51258
Apr 15 15:13:31 Enigma sshd[720]: Failed password for invalid user postgres from 49.233.204.37 port 51258 ssh2
2020-04-15 20:18:34
184.105.139.69 attack
20/4/15@08:13:30: FAIL: Alarm-Intrusion address from=184.105.139.69
...
2020-04-15 20:20:07
92.125.131.116 attackspam
Honeypot attack, port: 445, PTR: b-internet.92.125.131.116.snt.ru.
2020-04-15 20:34:55

Recently Reported IPs

252.52.86.112 72.88.190.63 132.18.92.80 84.135.11.13
131.19.202.24 58.134.182.141 78.165.191.79 47.254.35.144
203.159.7.235 137.242.8.241 35.150.107.196 153.248.110.211
115.49.236.241 72.46.6.176 155.197.65.70 125.111.1.124
158.110.249.254 214.208.37.124 120.148.4.0 35.161.105.178